Cryptography And Network Security

(CryptoSec.AB1.E1) / ISBN : 978-1-64459-188-8
This course includes
Lessons
TestPrep
Hands-On Labs
AI Tutor (Add-on)
134 Review
Get A Free Trial

About This Course

The Cryptography And Network Security course helps you explore the history and evolution of cryptographic techniques, including symmetric-key and public-key algorithms, hash functions, and digital signatures. The course delves into the mechanisms for secure communication over computer networks, including authentication, access control, and secure protocols such as SSL/TLS and IPsec. Additionally, you will gain an understanding of network security threats, including malware, denial-of-service attacks, and intrusion detection/prevention systems. 

Get the support you need. Enroll in our Instructor-Led Course.

Lessons

28+ Lessons | 130+ Quizzes | 201+ Flashcards | 201+ Glossary of terms

TestPrep

60+ Pre Assessment Questions | 2+ Full Length Tests | 60+ Post Assessment Questions | 120+ Practice Test Questions

Hands-On Labs

33+ LiveLab | 32+ Video tutorials | 44+ Minutes

1

Information and Network Security Concepts

  • Cybersecurity, Information Security, and Network Security
  • The OSI Security Architecture
  • Security Attacks
  • Security Services
  • Security Mechanisms
  •  Cryptography
  • Network Security
  • Trust and Trustworthiness
  • Standards
2

Introduction to Number Theory

  • Divisibility and The Division Algorithm
  • The Euclidean Algorithm
  • Modular Arithmetic
  • Prime Numbers4
  • Fermat’s and Euler’s Theorems
  • Testing for Primality
  • The Chinese Remainder Theorem
  • Discrete Logarithms
  • Appendix 2A: The Meaning of Mod
3

Classical Encryption Techniques

  • Symmetric Cipher Model
  • Substitution Techniques
  • Transposition Techniques
4

Block Ciphers and the Data Encryption Standard

  • Traditional Block Cipher Structure
  • The Data Encryption Standard
  • A DES Example
  • The Strength of DES
  • Block Cipher Design Principles
5

Finite Fields

  • Groups
  • Rings
  • Fields
  • Finite Fields of the Form GF(p)
  • Polynomial Arithmetic
  • Finite Fields of the Form GF (2n)
6

Advanced Encryption Standard

  • Finite Field Arithmetic
  • AES Structure
  • AES Transformation Functions
  • AES Key Expansion
  • An AES Example
  • AES Implementation
  • Appendix 6A: Polynomials with Coefficients in GF(28)
7

Block Cipher Operation

  • Multiple Encryption and Triple DES
  • Electronic CodeBook
  • Cipher Block Chaining Mode
  • Cipher Feedback Mode
  • Output Feedback Mode
  • Counter Mode
  • XTS-AES Mode for Block-Oriented Storage Devices
  • Format-Preserving Encryption
8

Random Bit Generation and Stream Ciphers

  • Principles of Pseudorandom Number Generation
  • Pseudorandom Number Generators
  • Pseudorandom Number Generation Using a Block Cipher
  • Stream Ciphers
  • RC4
  • Stream Ciphers Using Feedback Shift Registers
  • True Random Number Generators
9

Public-Key Cryptography and RSA

  • Principles of Public-Key Cryptosystems
  • The RSA Algorithm
10

Other Public-Key Cryptosystems

  • Diffie–Hellman Key Exchange
  • Elgamal Cryptographic System
  • Elliptic Curve Arithmetic
  • Elliptic Curve Cryptography
11

Cryptographic Hash Functions

  • Applications of Cryptographic Hash Functions
  • Two Simple Hash Functions
  • Requirements and Security
  • Secure Hash Algorithm (SHA)
  • SHA-3
12

Message Authentication Codes

  • Message Authentication Requirements
  • Message Authentication Functions
  • Requirements for Message Authentication Codes
  • Security of MACs
  • MACs Based on Hash Functions: HMAC
  • MACs Based on Block Ciphers: DAA and CMAC
  • Authenticated Encryption: CCM and GCM
  • Key Wrapping
  • Pseudorandom Number Generation Using Hash Functions and MACs
13

Digital Signatures

  • Digital Signatures
  • Elgamal Digital Signature Scheme
  • Schnorr Digital Signature Scheme
  • Nist Digital Signature Algorithm
  • Elliptic Curve Digital Signature Algorithm
  • RSA-PSS Digital Signature Algorithm
14

Lightweight Cryptography and Post-Quantum Cryptography

  • Lightweight Cryptography Concepts
  • Lightweight Cryptographic Algorithms
  • Post-Quantum Cryptography Concepts
  • Post-Quantum Cryptographic Algorithms
15

Cryptographic Key Management and Distribution

  • Symmetric Key Distribution Using Symmetric Encryption
  • Symmetric Key Distribution Using Asymmetric Encryption
  • Distribution of Public Keys
  • X.509 Certificates
  • Public-Key Infrastructure
16

User Authentication

  • Remote User-Authentication Principles
  • Remote User-Authentication Using Symmetric Encryption
  • Kerberos
  • Remote User-Authentication Using Asymmetric Encryption
  • Federated Identity Management
17

Transport-Level Security

  • Web Security Considerations
  • Transport Layer Security
  • HTTPS
  • Secure Shell (SSH)
18

Wireless Network Security

  • Wireless Security
  • Mobile Device Security
  • IEEE 802.11 Wireless LAN Overview
  • IEEE 802.11i Wireless LAN Security
19

Electronic Mail Security

  • Internet Mail Architecture
  • Email Formats
  • Email Threats and Comprehensive Email Security
  • S/MIME
  • DNSSEC
  • DNS-Based Authentication of Named Entities
  • Sender Policy Framework
  • Domainkeys Identified Mail
  • Domain-Based Message Authentication, Reporting, and Conformance
20

IP Security

  • IP Security Overview
  • IP Security Policy
  • Encapsulating Security Payload
  • Combining Security Associations
  • Internet Key Exchange
21

Network Endpoint Security

  • Firewalls
  • Intrusion Detection Systems
  • Malicious Software
  • Distributed Denial of Service Attacks
22

Cloud Security

  • Cloud Computing
  • Cloud Security Concepts
  • Cloud Security Risks and Countermeasures
  • Cloud Security as a Service
  • An Open-Source Cloud Security Module
23

Internet of Things (IoT) Security

  • The Internet of Things
  • IoT Security Concepts and Objectives
  • An Open-Source IoT Security Module

Appendix A: Basic Concepts from Linear Algebra

  • A.1 Operations on Vectors and Matrices
  • A.2 Linear Algebra Operations Over Zn

Appendix B: Measures of Secrecy and Security

  • B.1 Conditional Probability
  • B.2 Perfect Secrecy
  • B.3 Information and Entropy
  • B.4 Entropy and Secrecy
  • B.5 Min-Entropy

Appendix C: Data Encryption Standard

Appendix D: Simplified AES

  • D.1 Overview
  • D.2 S-AES Encryption and Decryption
  • D.3 Key Expansion
  • D.4 The S-box
  • D.5 S-AES Structure

Appendix E: Mathematical Basis of the Birthday Attack

  • E.1 Related Problem
  • E.2 The Birthday Paradox
  • E.3 Useful Inequality
  • E.4 The General Case of Duplications
  • E.5 Overlap Between Two Sets

0

Information and Network Security Concepts

  • Obtaining Information about an IP Version
  • Getting Information about the DNS
  • Getting Information about the UDP Ports
  • Getting Information about the Current Connection Statistics of UDP
  • Getting the UDP Settings
  • Getting Information about the TCP Ports
  • Getting Information about the Current Connection Statistics of TCP
  • Getting the TCP Settings
  • Obtaining Information about the Net Firewall Profile
  • Obtaining IP Route Information from the IP Routing Table
2

Classical Encryption Techniques

  • Using OWASP ZAP
  • Performing Symmetric Encryption
5

Advanced Encryption Standard

  • Encrypting a File or Folder
  • Configuring File and Share Permissions
  • Using BitLocker in Windows 10
  • Configuring MDT
  • Creating a New Partition and Configuring BitLocker
  • Implementing AES Encryption
8

Public-Key Cryptography and RSA

  • Using OpenSSL to Create a Public/Private Key Pair
  • Using the RSA Asymmetric Algorithm
10

Cryptographic Hash Functions

  • Installing Windows Server Backup and Performing Backup of a Folder
  • Creating a Backup Schedule
  • Creating a Backup Once
  • Configuring RAID
  • Configuring RAID 5
  • Installing the Failover Cluster Feature
  • Using the Dependency Viewer
14

Cryptographic Key Management and Distribution

  • Using Steganography
  • Enabling a Keylogger in a Target Machine
19

IP Security

  • Adding Revision to the Revision History
  • Viewing and Downloading the Policy Templates
  • Opening the Policy Template and Setting the Company Name
  • Reviewing and Modifying the Policy Items

Cryptography And Network Security

$279.99

Buy Now

Related Courses

All Course
scroll to top